Department of Defense (DoD) Lockheed Martin Security

Size: px
Start display at page:

Download "Department of Defense (DoD) Lockheed Martin Security"

Transcription

1 Department of Defense (DoD) INITIAL TRAINING GUIDE Lockheed Martin Security

2 Table of Contents Congratulations 2 Introduction 3 Reporting Requirements 4 Procedures and Duties 5 Safeguarding 6 Reproduction 6 Transmission 6 Retention/Disposition 6 Classification Overview 8 Counterintelligence 9 Conclusion 10 Completing the Non-Disclosure Agreement 10 Glossary 11 LOCKHEED MARTIN PROPRIETARY INFORMATION DoD Initial Training Guide 1

3 CONGRATULATIONS You have been granted a Department of Defense (DoD) security clearance and consequently the U.S. government has provided authority for you to access certain classified information. As a newly cleared individual, there are basic security concepts you will need to learn. This training guide will provide the foundational knowledge, expectations and requirements you will need to understand prior to beginning work. After 30 days, you will take an online course that will recap much of this information, along with scenario-based exercises that will test your understanding of the material. You will also get to know Security Professionals who can assist and guide you in maintaining a strong, defensive security posture. Thank you for your attention to this important topic, and welcome aboard! Bob Trono Vice President & Chief Security Officer Lockheed Martin DoD Initial Training Guide 2

4 INTRODUCTION Individual Security Responsibilities The U.S. government has established detailed requirements which are outlined in the National Industrial Security Program Operating Manual, or NISPOM, to ensure the protection of classified information. Part of your role as a cleared Lockheed Martin employee is to protect our nation from a variety of threats. Our National Security is constantly under attack by adversaries both foreign and domestic; by protecting classified information, you are fulfilling a critical role in protecting our nation. This training guide will provide security procedures that are critical for cleared employees to understand and comply with government security regulations. Although each cleared facility adheres to set government security standards, implementation procedures may vary from site to site. Penalties Penalties for unauthorized disclosure of classified information, which can be assessed against both cleared employees and the corporation, include: Fines of up to $10,000 Imprisonment of up to 10 years For defense contractors such as Lockheed Martin, the Defense Security Service (DSS) is the primary DoD security agency assigned to oversee the protection of classified information. DoD Initial Training Guide 3

5 Reporting Requirements Now that you are a cleared employee, there are a number of reporting requirements you must adhere to in order to maintain your security clearance. These reporting requirements are centered on events and activities that could potentially impact your ability to protect classified information. Change in Personal Status Name Citizenship Residence Marital status Cohabitation that creates a heightened risk of foreign coercion Job assignment no longer requiring a security clearance Suspicious Contact Any contact with an individual that is suspicious in nature, whether they are a U.S. or foreign person Someone taking an unusual interest in you and your job and/or asking probing questions about what you do and who you work for These contacts can occur online, through social media, , via phone, written correspondence, or in person. Some examples of suspicious contacts include: Request for protected information under the guise of a price quote or purchase request, market survey, or other pretense Attempts to entice cleared employees into situations that could lead to blackmail or extortion Attempts by foreign customers to gain access to hardware and information that exceeds the limitations of the export license on file Attempts to place cleared personnel under obligation through special treatment, favors, gifts, or money These reports should be made to the local Security Office or to the LMPeople system internally. If in doubt as to whether something is reportable, consult with your Security Office. Adverse Information You must also report information that reflects unfavorably on the integrity or character of yourself or another cleared individual that may impair the ability to safeguard classified materials. This information is defined as adverse information. Some examples of adverse information include: Known or suspected violation of security rules by you or another individual Known or suspected compromise of classified information by you or another individual Any arrest or criminal activity Treatment for psychological, mental, emotional, and personality disorders and counseling, except family/marriage, grief and combat-related counseling (unless the counseling was precipitated by a violent action or event) Substance abuse Medical marijuana (prior to use) Use of illegal controlled substances (which includes marijuana under federal law) Unexplained affluence Excessive indebtedness or recurring financial difficulties (e.g., foreclosure or bankruptcy) Knowledge of any individual who no longer wants to work on classified programs Close or continuous contact with a foreign person or entity Misuse of any company or U.S. government information systems DoD Initial Training Guide 4

6 Procedures and Duties Levels of Classified Information The United States government has three levels of classified information. The level of classification is determined by the degree of negative impact to National Security if improperly disclosed. The classification levels are defined as: CONFIDENTIAL - This classification is assigned when the unauthorized disclosure of information or material could reasonably be expected to cause damage to National Security. SECRET - This classification is assigned when the unauthorized disclosure of information or material could reasonably be expected to cause serious damage to National Security. TOP SECRET - This classification is assigned when the unauthorized disclosure of information or material could reasonably be expected to cause exceptionally grave damage to National Security. You may sometimes hear classified information referred to as National Security information or collateral information. Release of Information Rank, level, or position within the company does not equal a clearance or need-to-know. Prior to releasing information, the holder must ensure that the recipient of the information has both: Proper security clearance Cleared individuals may access classified information at or below their clearance level Need-to-know Each individual shall only be granted access to the specific classified information that is absolutely required to perform their job. If you have a question about whether someone should have access to classified materials and information, ALWAYS contact your local Security Office. Collateral refers to classified materials for which special requirements are not formally established. DoD Initial Training Guide 5

7 Procedures and Duties (Cont) Handling of Classified Information Safeguarding Some general safeguarding guidelines include: Never leave classified material unattended Secure classified material in a governmentapproved container or area Properly protect combinations that control access to classified materials and areas Understand how your facility secures classified materials and areas at the end of each day When transmitting classified information outside of a Lockheed Martin facility, comply with all special requirements Take actions to prevent the loss or unauthorized disclosure of classified information; be mindful when holding classified discussions (such as hallways, cubicles, break rooms, etc.) Be aware of local policies or restrictions regarding cell phones, cameras, MP3 players, tablets, and any other personal electronic device entering classified areas Understand the various types of approved areas for classified operations including but not limited to closed and restricted areas Recognize that classified material comes in various forms (such as documents, hardware or assets, electronic media, communications or transmissions) In case of emergency, follow all practical security measures for safeguarding classified material as the situation allows. YOUR PERSONAL SAFETY COMES FIRST! Reproduction Reproduction of classified material: Should always be kept to a minimum Should be performed only by authorized personnel familiar with the procedure Should be performed only on authorized equipment Transmission All classified materials coming in and out of a facility by mail, fax, or courier must be sent and received by the Security Office. If you receive a classified package directly, notify your local Security Office IMMEDIATELY! Retention / Disposition Contractors are authorized to retain classified material received or generated under a contract for two years following completion of the contract, unless other guidance is provided by the Government Contracting Authority (GCA). Classified material should only be retained for valid contract performance purposes and dispositioned when no longer needed. Destruction of classified information must be accomplished by authorized methods and personnel ONLY. Understand the destruction methods at your facility. DoD Initial Training Guide 6

8 Procedures and Duties (Cont) Unauthorized Release of Classified Information There are negative impacts associated with the unauthorized release of classified information. These impacts include but are not limited to: Damage to National Security Weakened integrity of classified information and technical advantage Damage to company reputation and customer relationships Potential negative impact on award fees Loss of classified contracts and/or exclusion from bidding Loss of personal security clearance and/or employment Data Spills Data Spills, also known as data contaminations, are a form of unauthorized release of classified information. Data spills occur when classified information is either intentionally or unintentionally introduced to an unclassified or unaccredited information system. Improper handling of data is at the core of most data spills. The best way to prevent a data spill is to focus on what you can control: Know where to find and how to use security classification guides for your program or project Properly handle and appropriately mark classified information If you receive or discover classified or potentially classified information on an unclassified information system, immediately contact your local Security Office for guidance. Do not forward, print, save, or delete the suspected information. Security Incident Reporting The improper safeguarding, handling, reproduction, transmission, disposition, or disclosure of classified material is a reportable security incident. If you commit or discover a potential security incident, immediately report the circumstances to your local Security Office and, if possible, ensure the material involved is properly safeguarded. When reporting an incident, be cognizant not to disclose classified information over unsecure means. Security personnel will evaluate the circumstances and take actions as appropriate. By adhering to security procedures, you ensure that classified information is properly protected and contribute to the nation s security. By properly protecting information, we meet our contractual obligations, enhance customer trust, help ensure Lockheed Martin s continued ability to compete for new business opportunities, and maintain our reputation as an industry leader. DoD Initial Training Guide 7

9 Classification Overview Information becomes classified by a designated Original Classification Authority after it has been determined the information is owned, produced by or for, or controlled by the United States, and that unauthorized disclosure could result in damage to National Security. When marking classified material (i.e. documents, media, or electronic files), the following must be included: The overall level of classification Title of the material Date created Name and address of the originating facility Identity of the classifier Period of time protection is required Any sources used to classify the information Any portions that contain classified information Classification markings may be identified from any of the following three places: Security Classification Guides Source Materials Contract Security Classification Specifications or DD Form 254 Classification markings help facilitate proper safeguarding requirements and assist in the prevention of inadvertent release. You may be required to perform derivative classification decisions in the course of your job responsibilities; if this is the case, you will receive additional training in greater detail. Carrying forward these markings to newly-generated material is our responsibility as contractors, who make derivative classification decisions when we include existing classified information into new forms. SECRET SECRET (U) Originally Classified Document August 29, 2014 U.S. Navy Program Executive Office 123 Washington Drive Washington, DC (U) Derivatively Classified Document August 30, 2014 Lockheed Martin Corporation 6801 Rockledge Drive Bethesda, MD Classified By: John Smith, Senior Program Manager Reason: 1.4(a) Derived From: XYZ Security Classification Guide, dated 11 Nove 2014, U.S. Navy Downgrade On: Downgrade To: CONFIDENTIAL Declassify On: Classified By: Name & Position OR Personal Identifier Derived From: Originally Classified Document, dated August 29, 2014, U.S. Navy Downgrade On: Downgrade To: CONFIDENTIAL Declassify On: SECRET SECRET Classification markings and examples in this guide are for training purposes only. DoD Initial Training Guide 8

10 Counterintelligence Counterintelligence is information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage or sabotage; conducted for on or behalf of foreign powers, organizations, international terrorist groups or individuals. What does that mean to you? Counterintelligence is identifying intelligence threats to Lockheed Martin and our government customers, and developing strategies to neutralize those threats. As a newly cleared employed with Lockheed Martin, it s important you re aware of these threats. Intelligence threats can come from Foreign Intelligence Services, foreign and/or domestic industry competitors, criminal, terrorist, and/or extreme activist organizations, and trusted insiders, also known as the insider threat. Intelligence collection can come in a variety of different forms, including: elicitation, open source collection, electronic surveillance, cyber intrusions, social engineering and exploitation of social media, or insider threat activity. The insider threat is someone who has legitimate access to information and uses that access to steal company or classified USG information for themselves or on behalf of another person or party. Indications of insider threat activity might include an apparent disgruntlement with employer or USG, disregard for security and IT procedures, outward expression of loyalties towards competitors or foreign nations, etc. Employees should maintain a keen awareness of their surroundings both in and outside of the workplace and discuss with company security or your customer staff security officer any suspicious incidents or concerns you might have. Foreign Intelligence Services Foreign and/or Domestic Industry Competitors Criminal, Terrorist, and/or Extreme Activist Organizations Trusted Insiders DoD Initial Training Guide 9

11 Conclusion This guide provided you with information on: Your reporting requirements The security duties and procedures applicable to your job The Security Classification System Counterintelligence, the insider threat, and defensive security practices to mitigate these threats Remember that each facility supports unique contracts and may implement requirements in slightly different ways. To be successful in your new role as a cleared Lockheed Martin employee, it is imperative that you work closely with your local Security Office regarding the content reviewed in this guide and any additional facility specific requirements. Now that you have received your security clearance, you play an integral part in ensuring the success of the Lockheed Martin Security Program and our National Security The nature of your new responsibilities relates directly to our customers. Please continue to the instructions on receiving credit for this course. Completing the Non-Disclosure Agreement Now that you have completed this training, please click here to retrieve and complete the required Standard Form (SF)-312 also known as the Classified Information Non-Disclosure Agreement. The following options are available to you for submitting this required form: Fax without a cover sheet to LMSecurity at (720) a digital copy of the requested document to: [email protected] Mail the requested document overnight to: Lockheed Martin Corporation Attn: LMSecurity 100 Global Innovation Circle, MP801 Orlando, FL Once LMSecurity receives your SF-312, you will receive credit in our internal training system. DoD Initial Training Guide 10

12 GLOSSARY Collateral All National Security information classified Confidential, Top Secret or Secret under the provisions of an executive order for which special community systems of compartmentation (e.g., non-special Compartmented Information (non-sci)) are not formally established Confidential A level of classification that is assigned when the unauthorized disclosure of information or material could reasonably be expected to cause damage to National Security Courier An individual who has been briefed and meets the requirements to transport classified materials Derivative classification decisions The incorporating, paraphrasing, restating, or generating in new form information that is already classified, and marking the newly developed material consistent with the classification markings that applies to the source information. Derivative classification includes the classification of information based on classification guidance. The duplication or reproduction of existing classified information is not derivative classification. Need-to-know must be in place along with a security clearance to be granted access to specific classified information required to perform a job NISPOM National Industrial Security Program Operating Manual Secret A level of classification that is assigned when the unauthorized disclosure of information or material could reasonably be expected to cause serious damage to National Security Security clearance - An administrative authorization for access to National Security information up to a stated classification level (Top Secret, Secret, Confidential). NOTE: A security clearance does not, by itself, allow access to controlled access programs Top Secret A level of classification that is assigned when the unauthorized disclosure of information or material could reasonably be expected to cause exceptionally grave damage to National Security USG United States government DoD Department of Defense DSS Defense Security Service GCA Government Contracting Authority, which provides guidance to contactors An extensive list of security terms can be found at the Defense Security Service website. DoD Initial Training Guide 11

13 Copyright 2014 Lockheed Martin Corporation PIRA No. CHQ VC584

Annual DoD Security Refresher Training

Annual DoD Security Refresher Training Annual DoD Security Refresher Training Welcome to your annual security refresher training. The purpose of this briefing is to remind you of your personal responsibilities and liabilities under United States

More information

Introduction. Derivative Classification Training JOB AID

Introduction. Derivative Classification Training JOB AID Introduction Derivative Classification Training The purpose of this job aid is to provide reference information for the responsibilities and procedures associated with derivative classification. This job

More information

Consultant Annual DoD Security Refresher

Consultant Annual DoD Security Refresher Consultant Annual DoD Security Refresher 1 About This Course This course should be taken by Consultants Only in this PDF format All others should take this course online LMPeople > LMCareers > Learning

More information

NATO SECURITY BRIEFING NATO/ATOMAL SECURITY BRIEFING

NATO SECURITY BRIEFING NATO/ATOMAL SECURITY BRIEFING NATO SECURITY BRIEFING FOREWORD This sample security briefing contains the minimum elements of information that must be provided to individuals upon initial indoctrination for access to NATO classified

More information

Department of Commerce Office of Security. Initial Information Security Briefing

Department of Commerce Office of Security. Initial Information Security Briefing Department of Commerce Office of Security Initial Information Security Briefing Security Clearance A security clearance is a determination of trust, which makes you eligible for access to classified information.

More information

There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened.

There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened. Data Spills Short Introduction There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened. When data spills occur, they

More information

Defense Security Service (DSS)

Defense Security Service (DSS) Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) ADMINISTRATIVE INQUIRY (AI) PROCESS JOB AID July 2011 TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 Scope... 1 2. PRELIMINARY

More information

JOB AID. Derivative Classification Training U N I T E D A M E R I C A S TAT E S O F. Center for Development of Security Excellence (CDSE) www.cdse.

JOB AID. Derivative Classification Training U N I T E D A M E R I C A S TAT E S O F. Center for Development of Security Excellence (CDSE) www.cdse. Center for Development of Security Excellence Learn. Perform. Protect. www.cdse.edu DEFENSE SECURITY SERVICE U N I T E D S TAT E S O F A M E R I C A Center for Development of Security Excellence (CDSE)

More information

PHILIP MORRIS INTERNATIONAL INC.

PHILIP MORRIS INTERNATIONAL INC. PHILIP MORRIS INTERNATIONAL INC. Code of Business Conduct and Ethics for Directors 1. Introduction This Code of Business Conduct and Ethics for Directors ( Code ) has been adopted by Philip Morris International

More information

1. Compliance with Laws, Rules and Regulations

1. Compliance with Laws, Rules and Regulations CODE OF BUSINESS CONDUCT - EXAMPLE INTRODUCTION This Code of Business Conduct covers a wide range of business practices and procedures. It does not cover every issue that may arise, but it sets out basic

More information

EADS-NA Code of Ethics

EADS-NA Code of Ethics Page: 1 of 7 EADS-NA Code of Ethics Introduction The Company demands high ethical standards of conduct from its directors, employees, and agents and will conduct its business with honesty, integrity, and

More information

Counterintelligence Awareness Glossary

Counterintelligence Awareness Glossary Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity

More information

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5 Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose

More information

Suggested Contractor File Folder Headings

Suggested Contractor File Folder Headings Suggested Contractor File Folder Headings 1. Facility Clearance 2. Personnel Clearances 3. Recurring Security Education 4. Self-Inspection 5. Security Correspondence 6. Standard Practice Procedures 7.

More information

ETHICS. Code of Conduct for Service Providers

ETHICS. Code of Conduct for Service Providers ETHICS Code of Conduct for Service Providers ETHICS Code of Conduct for Service Providers This Code of Conduct for Service Providers contains the legal and ethical business practice standards that are

More information

Legislative Language

Legislative Language Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting

More information

Commanding Officer and Executive Officer. Information and Personnel Security Reference Handbook

Commanding Officer and Executive Officer. Information and Personnel Security Reference Handbook Commanding Officer and Executive Officer Information and Personnel Security Reference Handbook Assistant for Information and Personnel Security (N09N2) Office of the Chief of Naval Operations Governing

More information

STATEMENT FROM THE CHAIRMAN

STATEMENT FROM THE CHAIRMAN STATEMENT FROM THE CHAIRMAN In an ever-changing global marketplace, it is important for all of us to have an understanding of the responsibilities each of have in carrying out day-to-day business decisions

More information

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the

More information

Insider Trading Policy

Insider Trading Policy Purpose U.S. federal and state and Canadian provincial securities laws prohibit buying, selling, or making other transfers of securities by persons who have material information that is not generally known

More information

CYBERSECURITY POLICY

CYBERSECURITY POLICY * CYBERSECURITY POLICY THE CYBERSECURITY POLICY DEFINES THE DUTIES EMPLOYEES AND CONTRACTORS OF CU*ANSWERS MUST FULFILL IN SECURING SENSITIVE INFORMATION. THE CYBERSECURITY POLICY IS PART OF AND INCORPORATED

More information

This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information.

This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information. Department of Homeland Security Management Directives System MD Number: 11043 Issue Date: 09/17/2004 SENSITIVE COMPARTMENTED INFORMATION PROGRAM MANAGEMENT I. Purpose This directive establishes Department

More information

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP

More information

Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service

Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service February 2014 Training Objectives DSS Agency DSS Mission

More information

IT Security Handbook. Incident Response and Management: Targeted Collection of Electronic Data

IT Security Handbook. Incident Response and Management: Targeted Collection of Electronic Data IT Security Handbook Incident Response and Management: Targeted Collection of Electronic Data ITS HBK 2810.09 03 Effective Date: 20110824 Expiration Date: 20130824 Responsible Office: OCIO/ Deputy CIO

More information

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating

More information

Reproductive Medicine Associates of New Jersey, LLC

Reproductive Medicine Associates of New Jersey, LLC NOTICE OF PRIVACY PRACTICES Effective Date: September 20, 2013 Last Modified: May 12, 2013 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO

More information

Data Security Incident Response Plan. [Insert Organization Name]

Data Security Incident Response Plan. [Insert Organization Name] Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security

More information

13.19 ETHICS REPORTING POLICY AND PROCEDURE

13.19 ETHICS REPORTING POLICY AND PROCEDURE 13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5240.06 May 17, 2011 Incorporating Change 1, May 30, 2013 USD(I) SUBJECT: Counterintelligence Awareness and Reporting (CIAR) References: See Enclosure 1 1. PURPOSE.

More information

FS-5-101 Rev 1.2 Page 1 of 11

FS-5-101 Rev 1.2 Page 1 of 11 Page 1 of 11 First Solar, Inc. (Adopted as of October 3, 2006; revised July 29, 2015) Introduction This of First Solar, Inc. and its subsidiaries (the Company ) summarizes the values, principles and business

More information

Computer Security Incident Reporting and Response Policy

Computer Security Incident Reporting and Response Policy SECTION: 3.8 SUBJECT: Computer Security Incident Reporting and Response Policy AUTHORITY: Executive Director; Chapter 282.318, Florida Statutes - Security of Data and Information Technology Resources;

More information

Practice Test Security Fundamentals Professional Certification (SFPC) Multiple Choice. Multiple-Choice Sample Question # 1

Practice Test Security Fundamentals Professional Certification (SFPC) Multiple Choice. Multiple-Choice Sample Question # 1 The following Practice Test presents samples of the type, difficulty, and format of questions found on the SFPC assessment. At the end of the Practice Test, a table is provided outlining the topics and

More information

KAM Specialties, Inc. (KAM) Code of Ethics

KAM Specialties, Inc. (KAM) Code of Ethics KAM Specialties, Inc. (KAM) Code of Ethics Date Approved : 11/15/2010 Introduction KAM s executive management is responsible for setting standards of business ethics and overseeing compliance with these

More information

BERKELEY COLLEGE DATA SECURITY POLICY

BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data

More information

Public Law 113 283 113th Congress An Act

Public Law 113 283 113th Congress An Act PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it

More information

Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS

Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS The Contractor Security Review Requirement... 2 The Self-Inspection Handbook for NISP Contractors... 2 The Elements of Inspection... 2 Self-Inspection

More information

FDOH Information and Privacy Awareness Training Learner Course Guide

FDOH Information and Privacy Awareness Training Learner Course Guide Florida Department of Health FDOH Information and Privacy Awareness Training Learner Course Guide To protect, promote & improve the health of all people in Florida through integrated state, county, & community

More information

Foreign Collection Methods: Indicators and Countermeasures

Foreign Collection Methods: Indicators and Countermeasures DSS Foreign Collection Methods: and IDENTIFY Requests for Information Academic Solicitation Suspicious Network Activity Targeting at Trade Shows Solicitation and Marketing /Seeking Employment Foreign Visits

More information

CODE OF ETHICS FOR SENIOR FINANCIAL OFFICERS

CODE OF ETHICS FOR SENIOR FINANCIAL OFFICERS CODE OF ETHICS FOR SENIOR FINANCIAL OFFICERS Statement of Principle Our long-standing policy, as stated in our Pledge, is to maintain the highest standard of moral and ethical behavior in our relationships

More information

1 Purpose The DOE M 470.4-4A, Information Security Manual states, All information security programs, practices, and procedures developed within DOE must be consistent with and incorporate the requirements

More information

Department of Homeland Security DHS Directives System Directive Number: 140-04 Revision Number: 00 Issue Date: SPECIAL ACCESS PROGRAM MANAGEMENT

Department of Homeland Security DHS Directives System Directive Number: 140-04 Revision Number: 00 Issue Date: SPECIAL ACCESS PROGRAM MANAGEMENT I. Purpose Department of Homeland Security DHS Directives System Directive Number: 140-04 Revision Number: 00 Issue Date: 08/12/2009 SPECIAL ACCESS PROGRAM MANAGEMENT This Directive establishes the Department

More information

Our vision. A company where the best people want to work.

Our vision. A company where the best people want to work. Code of Conduct Our vision A company where the best people want to work. The world leader in chemical distribution, providing unparalleled connectivity between customers and suppliers. 2 Univar s guiding

More information

UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS. Revised as of March 3, 2014

UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS. Revised as of March 3, 2014 I. Statement of Policy UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS Revised as of March 3, 2014 Universal Insurance Holdings, Inc. ( UIH ) and its subsidiaries (collectively,

More information

CODE OF ETHICS POLICY

CODE OF ETHICS POLICY CODE OF ETHICS POLICY The YMCA's reputation is dependent upon the good judgment, ethical standards and personal integrity of every individual in the YMCA. As the YMCA continues to grow, it is of paramount

More information

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information NAMI EASTSIDE - 13 POLICY: Privacy and Security of Protected Health Information (HIPAA Policies and Procedures) DATE APPROVED: Pending INTENT: (At present, none of the activities that NAMI Eastside provides

More information

HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N

HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N 1 COURSE OVERVIEW This course is broken down into 4 modules: Module 1: HIPAA Omnibus Rule - What you need to know to remain

More information

Code of Business Conduct and Ethics THE WOODBRIDGE WAY. integrity honesty respect responsibility

Code of Business Conduct and Ethics THE WOODBRIDGE WAY. integrity honesty respect responsibility Code of Business Conduct and Ethics THE WOODBRIDGE WAY integrity honesty respect responsibility Reissued June 12, 2015 Code of Business Conduct and Ethics THE WOODBRIDGE WAY INTRODUCTION Woodbridge Foam

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation

More information

DSS Monthly Newsletter

DSS Monthly Newsletter (Sent on behalf of ISR) Dear FSO, DSS Monthly Newsletter December 2012 This is the monthly email containing recent information, policy guidance, security education and training updates. If you have any

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment

More information

College of DuPage Information Technology. Information Security Plan

College of DuPage Information Technology. Information Security Plan College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data

More information

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology

More information

Privacy and Data Security Update for Defense Contractors

Privacy and Data Security Update for Defense Contractors Privacy and Data Security Update for Defense Contractors T.J. Crane May 19, 2017 Overview DoD interim rule Expanded DFAR reporting obligations New DFAR definitions Cloud services Changes to local breach

More information

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder

More information

Obtaining a Facility Security Clearance A Pinkerton Government Services White Paper

Obtaining a Facility Security Clearance A Pinkerton Government Services White Paper Obtaining a Facility Security Clearance A Pinkerton Government Services White Paper Robert Maydoney Vice President Sales Pinkerton Government Services, Inc. 740 North Main Street Mansfield, MA 02048 T:

More information

MEAD JOHNSON NUTRITION COMPANY CODE OF ETHICS FOR SENIOR FINANCIAL OFFICERS

MEAD JOHNSON NUTRITION COMPANY CODE OF ETHICS FOR SENIOR FINANCIAL OFFICERS MEAD JOHNSON NUTRITION COMPANY CODE OF ETHICS FOR SENIOR FINANCIAL OFFICERS Statement of Principle Our policy is to maintain the highest standard of moral and ethical behavior in our relationships with

More information

Supplier Awareness. Export Control/ ITAR

Supplier Awareness. Export Control/ ITAR Export Control & ITAR Supplier Awareness Export Control/ ITAR THIS INFORMATION IS PROVIDED BY PAR SYSTEMS, INC. ("PAR"). PAR IS NOT A LAW FIRM, AND THE INFORMATION CONTAINED HEREIN IS NOT INTENDED TO BE

More information

Business Conduct, Compliance and Ethics Program. important

Business Conduct, Compliance and Ethics Program. important Business Conduct, Compliance and Ethics Program important Table of Contents Letter from Troy Kirchenbauer As healthcare s first online direct contracting market, aptitude is committed to upholding the

More information

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information

HIPAA and Privacy Policy Training

HIPAA and Privacy Policy Training HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training

More information

We will pursue our business with honor, fairness, and respect for the individual and. the public at large ever mindful that there

We will pursue our business with honor, fairness, and respect for the individual and. the public at large ever mindful that there O Business with Integrity O We will pursue our business with honor, fairness, and respect for the individual and the public at large ever mindful that there is no right way to do a wrong thing. Introduction

More information

1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division.

1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division. PAGE: 1 of 7 1. GENERAL 1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division. 1.2 The Winnipeg School Division

More information

Copyright 2012, General Dynamics Information Technology. All Rights Reserved.

Copyright 2012, General Dynamics Information Technology. All Rights Reserved. Introduction Over the years, General Dynamics Information Technology has experienced significant growth in its IT services business serving government and commercial customers worldwide. As a valued supplier

More information

CODE OF CONDUCT AND ETHICS

CODE OF CONDUCT AND ETHICS The masculine gender is used in this document without any discrimination and refers to both masculine and feminine genders. TABLE OF CONTENTS TABLE OF CONTENTS... 2 A. WHO THIS CODE APPLIES TO... 3 B.

More information

NOTICE OF PRIVACY PRACTICES Effective: September 20, 2013

NOTICE OF PRIVACY PRACTICES Effective: September 20, 2013 Livingston Hospital and Healthcare Services 131 Hospital Drive Salem, KY 42078. NOTICE OF PRIVACY PRACTICES Effective: September 20, 2013 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE

More information

Macarthur Minerals Limited CODE OF CONDUCT. February 2012

Macarthur Minerals Limited CODE OF CONDUCT. February 2012 Macarthur Minerals Limited CODE OF CONDUCT February 2012 MACARTHUR MINERALS LIMITED AND ITS SUBSIDIARIES (THE COMPANY OR MACARTHUR ) CODE OF CONDUCT 1. INTRODUCTION 1.1 The Macarthur Mineral Limited (including

More information

EXPORT CONTROLS COMPLIANCE

EXPORT CONTROLS COMPLIANCE Responsible University Official: Vice President for Research Responsible Office: Office for Export Controls Compliance Origination Date: May 1, 2014 EXPORT CONTROLS COMPLIANCE Policy Statement Northwestern

More information

Code of Business Conduct

Code of Business Conduct Code of Business Conduct Purpose and Scope Vicor Corporation (together with its subsidiaries and divisions, Vicor, the Company, we, and the possessive forms thereof) is committed to the highest standards

More information

Ur-Energy Inc. Code of Business Conduct and Ethics

Ur-Energy Inc. Code of Business Conduct and Ethics Ur-Energy Inc. Code of Business Conduct and Ethics As Amended Effective February 5, 2014 2957409.2 TABLE OF CONTENTS INTRODUCTION... 3 CONFLICTS OF INTEREST... 3 GIFTS, INVITATIONS AND ENTERTAINMENT GUIDELINES...

More information

Message from the Co-Chairmen and Chief Executive Officers

Message from the Co-Chairmen and Chief Executive Officers Message from the Co-Chairmen and Chief Executive Officers As each of us works to meet individual and Company-wide business goals here at Torchmark, we must all ensure that the work we perform and the business

More information

Somerset County Council - Data Protection Policy - Final

Somerset County Council - Data Protection Policy - Final Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council

More information

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION Please Note: 1. THIS IS NOT A ONE-SIZE-FITS-ALL OR A FILL-IN-THE BLANK COMPLIANCE PROGRAM.

More information

GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks

GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks GAO For Release on Delivery Expected at 10:00 a.m. EDT Tuesday, March 27, 2012 United States Government Accountability Office Testimony Before the Subcommittee on Oversight and Investigations, Committee

More information

Sanchez Energy Corporation. Code of Business Conduct and Ethics

Sanchez Energy Corporation. Code of Business Conduct and Ethics Sanchez Energy Corporation Code of Business Conduct and Ethics Introduction The Board of Directors (the Board ) of Sanchez Energy Corporation (the Company ) has adopted this Code of Business Conduct and

More information

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology RUTGERS POLICY Section: 70.2.20 Section Title: Legacy UMDNJ policies associated with Information Technology Policy Name: Information Security: Incident Management Formerly Book: 95-01-09-02:00 Approval

More information

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHIEF INFORMATION OFFICER October 1, 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF

More information

Information Security Program Management Procedures and Guidelines

Information Security Program Management Procedures and Guidelines Directive: LPR 1620.1C Effective Date: June 20, 2014 Expiration Date: May 31, 2019 Langley Research Center Information Security Program Management Procedures and Guidelines National Aeronautics and Space

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

Bossier Parish Community College

Bossier Parish Community College Bossier Parish Community College Department of Cyber Information Technology Welcome to the Program! Network Security & Networking Tracks Code of Conduct This marks the beginning of your journey through

More information

White Paper. Information Security -- Network Assessment

White Paper. Information Security -- Network Assessment Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer

More information

HIPAA Security Training Manual

HIPAA Security Training Manual HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,

More information

company policy number 0001 LEGAL AND ETHICAL CONDUCT

company policy number 0001 LEGAL AND ETHICAL CONDUCT company policy number 0001 LEGAL AND ETHICAL CONDUCT eff. date replaces page 28 Mar. 2011 14 Feb. 2006 1 of 10 PURPOSE CPI has adopted this Code of Legal and Ethical Conduct ( Code ) to promote: honest

More information

Order. Directive Number: IM 10-3. Stephen E. Barber Chief Management Officer

Order. Directive Number: IM 10-3. Stephen E. Barber Chief Management Officer Pension Benefit Guaranty Corporation Order Subject: Protecting Sensitive Information Directive Number: IM 10-3 Effective Date: 4/23/08 Originator: OGC Stephen E. Barber Chief Management Officer 1. PURPOSE:

More information

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11 Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2

More information